Chapter 5: Information Security: Protecting Information and Resources Flashcards
Information Security
protect organization data and IS from unauthorized access and use
Costs of Information Security Breaches
stolen work, blackmail, money, damage to company property, clients and reputation, etc
CIA Triangle
Confidentiality
Integrity
Availability
Confidentiality
prevent disclosing information to anyone who is not authorized to access
Integrity
accuracy and reliability of information resources within an organization
Availability (3)
-computers and networks are operational
- users can obtain information required
- quick recovery in event of failure or disaster
McCumber Cube and sides
3 dimensional cube to bring goals together
Side 1: Transmission, Storage, Processing
Side 2: Confidentially, Integrity, Availability
Slide 3. Human Factors, Privacy and Practice, Technology
Threats: Spyware
software secretly gathers info about users
Threats: Adware
Form of spyware, collects info about user to displays ads in web browser
Threats: Phishing
Sending fraudulent emails appearing from legitimate sources. Not directed like spear phishing
Threats: Pharming
hijack IP address of a website etc users who enter website are directed to fraudulent website
Threats: Spear Phishing
target email scan with sole purpose of obtaining sensitive data from company, person or organization
Threats: Baiting & Quid Pro Quo
get someone to fall for something out of their own curiosity or fear, cyber actors offer them something in return
Keystroke Loggers
what are they
what can they be used for (3)
monitor and record keystrokes
1. track employees computer use
2. Malicious purposes
3. prevent antivirus and anti-spyware
Threats: Sniffing
hackers capture and record network traffic
Threats: Spoofing
gain access to network by posing as an authorized user, disguise their identity
Threats: Virus
self-propagating program code and attaches itself to many files and will cycle when program is used
Threats: Worm
virus or program that can independently spread without being attached to host program
Threats: Trojan Programming
A code that is intended to disrupt a computer, network or website